Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,245,116 Systems and methods for remote monitoring, security, diagnostics, and prognostics
A system includes a physical analysis module, a cyber analysis module, and a determination module. The physical analysis module is configured to obtain physical...
US-9,245,102 Combining navigation and fingerprint sensing
A method, device and machine readable medium are provided. The method comprises: activating a fingerprint sensor while performing a function other than...
US-9,244,862 Secure storage device permanently disabled by remote command
A communication and security device for a portable computer is disclosed including a housing, a connector provided on the housing for physical connection to the...
US-9,244,639 Secure, server-less print release
A print release environment includes a client computing device, an imaging device and an active directory. The client stores an imaging job on a local hard...
US-9,244,627 Secure data erasure system for erasing a plurality of data storage devices
An erasure system and method for sorting, tracking, and erasing a plurality of data storage devices using enterprise hardware and software designed for data...
US-9,244,133 Handheld devices and structures to detect sticky devices having magnets
Apparatus and methods for detecting concealed personal security threats may comprise conventional mirrors and less conventional arrays of Hall-effect sensors...
US-9,241,058 Mobile communication apparatus having anti-theft and auto-notification functions
A mobile communication apparatus comprises an anti-theft control circuit and a transmission control circuit. The anti-theft control circuit has an information...
US-9,240,996 Method and system for risk-adaptive access control of an application action
Risk-adaptive access control techniques are disclosed. In various embodiments, a value for a threat level attribute is determined based at least in part on...
US-9,240,989 Apparatus and method for secure over the air programming of a communication device
A system that incorporates the subject disclosure may perform, for example, receiving an over-the-air programming message that is utilizing a hypertext transfer...
US-9,240,976 Systems and methods for providing network security monitoring
Systems and methods are disclosed for providing security monitoring in a computer network, in an embodiment, a service accessible via a network port of a...
US-9,240,975 Security device implementing network flow prediction
A security device for processing network flows is described, including: one or more packet processors configured to receive incoming data packets associated...
US-9,240,889 Method and system for secure data access among two devices
An embodiment of the present invention provides a method for secure data access among two devices. The method comprises: retrieving unique information...
US-9,240,009 Mobile devices for commerce over unsecured networks
Techniques for managing modules or applications installed in a mobile device are described. To provide authentic and secured transactions with another device,...
US-9,239,951 Ergonomic man-machine interface incorporating adaptive pattern recognition based control system
An adaptive interface, predicting a desired user function, based on user history, as well as machine internal status and context. An input is predicted, and the...
US-9,239,938 Data holder, system and method
A protective data holding vault that includes a module with onboard memory that can be configured as a drive, e.g. flash drive, attached to a machine or...
US-9,239,937 Targeted security policy override
An aspect provides a method, including: gathering, with an information handling device, client system identification data of a client system; providing, with...
US-9,239,933 Piracy prevention and usage control system using access-controlled encrypted data containers
This is a system for controlling and restricting access (reading, writing, creating, deleting, manipulating, and control) to data and data representations of...
US-9,239,932 Secure handling of user related information between web applications
Methods and arrangements in a client node and a server node for supporting secure handling of information related to a user, said information being stored by...
US-9,239,925 Processor security
A device comprises a processor arranged to automatically execute boot code upon start-up or reset. The boot code comprises a code authentication procedure to...
US-9,239,920 Generation of working security key based on security parameters
Techniques for improving security of an electronics device are disclosed. In one aspect of the present disclosure, security of a device may be improved by...
US-9,239,802 System and method for protecting a plug server using encryption techniques without internet connectivity
Various systems, computer program products, and methods for securing a plug server and its data are described. According to the invention, the plug server will...
US-9,238,449 Vehicle control system including accelerometer based security warning and related methods
A vehicle control system may include a wireless communications device, a vehicle position determining device, and an accelerometer. The vehicle control system...
US-9,237,316 Method and system to characterize video background changes as abandoned or removed objects
A method and system for analyzing video data in a security system. An analysis compares a current frame to a background model. The analysis system compares the...
US-9,237,183 Updating a domain based on device configuration within the domain and remote of the domain
A system for maintaining a domain in a premises, wherein the domain is coupled with a remote server, is disclosed. The system includes an instruction receiver;...
US-9,237,170 Data loss prevention (DLP) methods and architectures by a cloud service
Embodiments of the present disclosure include data loss prevention (DLP) methods and architectures by a cloud-based service. The disclosed techniques of the...
US-9,237,157 Data processing and storage device
A device for processing and storing data is disclosed, which comprises a primary controller, a primary memory, a security element (SE), and at least one...
US-9,237,152 Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository
A method includes receiving data related to an individual, the data comprising a plurality of elements of personally-identifying information (PII). The method...
US-9,237,132 Load balancing in a network with session information
Methods and systems for balancing load among firewall security devices (FSDs) are provided. According to one embodiment, a switch maintains session data the...
US-9,237,126 One-way bus bridge
A one-way bus bridge pair that transfers secure data in one direction, the bus bridge pair including a transmitting bus bridge, a receiving bus bridge, and a...
US-9,237,125 System and associated methods for secure communications
A network security device and associated methods which protects a user's computer from the direct effects of software sent from a server by converting the data...
US-9,237,020 Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing...
Exposure of sensitive information to users is controlled using a first security token containing user identity and user credentials to represent the user who...
US-9,237,015 Compact and efficient communication security through combining anti-replay with encryption
A method of providing anti-replay protection, authentication, and encryption with minimal data overhead is provided. A sender uses an arbitrary-length...
US-9,237,012 Establishing secure communication between an implantable medical device and an external device
Establishing secure communication between an implantable medical device and an external device includes: accessing, at the implantable medical device,...
US-9,236,911 Secure transfer of whiteboard content
Technologies for securely transferring whiteboard content data from a smart whiteboard device to another smart whiteboard device are disclosed. The smart...
US-9,236,770 Atomic self-healing architecture in an electric power network
In one embodiment of this invention, identical communicating node elements are constructed and placed throughout a power delivery network. Each of these node...
US-9,236,762 System for the monitoring and maintenance of remote autonomously powered lighting installations
A system of monitoring and/or maintaining remotely located autonomously powered lights, security systems, parking meters, and the like is operable to receive...
US-9,235,855 Delivery of security solutions based on-demand
A computer can receive an alarm event data that results from detection of an event by an alarm system. The alarm event data comprises an identifier for the...
US-9,235,732 Secure communication methods
Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption...
US-9,235,731 Trusted data relay
Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption...
US-9,235,724 Systems, methods, and computer medium to securely transfer backup data between physically isolated networks...
Embodiments of computer-implemented methods, systems, and non-transitory computer-readable medium having one or more computer programs stored therein are...
US-9,235,723 Systems and methods for context-sensitive data security for business application performance optimization
Described herein are systems and methods for providing context-sensitive data security, for business application performance optimization. In accordance with an...
US-9,235,717 Secure copy and paste of mobile app data
Secure transfer of mobile application content is disclosed. A state-related event associated with a managed application in a managed set of applications may be...
US-9,235,714 Preventing persistent storage of cryptographic information using signaling
Organizations maintain and generate large amounts of sensitive information using computer hardware resources and services of a service provider. Furthermore,...
US-9,235,712 Securing external memory data
The present disclosure includes apparatus, systems, digital logic circuitry and techniques relating to data encoding. A method performed by a system on a chip...
US-9,235,702 Personal identification number security enhancement
A method that includes receiving, from a first entity having an input permission, a first data structure into a HSM, wherein the first data structure maps a...
US-9,235,698 Data encryption and smartcard storing encrypted data
A data encryption and decryption process, particularly for use in smart cards, in which the data is encrypted using an encryption key derived from a fingerprint...
US-9,235,692 Secure application debugging
A method, system, and/or computer program product enables the secure debugging of a software application. A server receives a secure software application from a...
US-9,235,617 Securing date data fields
A method facilitating searching of data containing protected date information includes generating one or more randomly escalating dateID values for each date...
US-9,235,532 Secure storage of full disk encryption keys
Data is securely stored on a storage device by encoding a data block into multiple encoded blocks, any number of which can be recombined to recover the data...
US-9,233,698 Railway safety critical systems with task redundancy and asymmetric communications capability
A railway safety critical application system substitutes commercial off-the-shelf (COTS) hardware and/or software for railway-domain specific product...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.